Kaspersky Endpoint Detection and Response (EDR) received the highest AAA award in SE Labs’ Enterprise Advanced Security test.

SE Labs test noted the solution for being able to detect complex targeted attacks, track malicious behavior from the beginning to the end of an attack and generate no false-positive results. All this, as the solution was exposed to advanced threat groups’ tools, techniques, and procedures.

SE Labs’ engineers tested the product under a range of complex attacks similar or identical to those used by Dragonfly and Dragonfly 2.0, FIN7 and Carbanak, Oilrig, and APT29 threat groups. This is to evaluate Kaspersky EDR capabilities.

The test also included its ability to correctly identify legitimate applications and behavior and measured false positive detections or other sub-optimum interactions.

As per the independent laboratory, Kaspersky EDR detected every targeted attack and tracked each hostile activity that occurred during the test. Even better, it also caught in-depth insights, capturing details as each threat proceeded down the attack chain from the initial introduction to the system through its execution and subsequent behavior by the attacker. Furthermore, with 100% of attacks detected, the solution also showed outstanding results in classifying legitimate applications and URLs with a 100% legitimate accuracy rating.

As a result, it finished 98% in the complete accuracy rating and was awarded the highest level of estimation – the AAA Award.

“Detecting breaches is an extremely challenging task. Detecting each stage of an attack, without making mistakes is far tougher. However, Kaspersky has done a great job in providing clear and deep insight into a range of advanced attacks,” said Simon Edwards, Chief Executive Officer at SE Lab.

The full report detailing the performance of Kaspersky EDR during the SE Labs’ test is available here.

For more information about Kaspersky Endpoint Detection and Response, Kaspersky’s official website.


Please enter your comment!
Please enter your name here